<p>Introduction<br><strong>CHAPTER 1</strong> Networking Models, Ports, Protocols, and Services<br> The OSI Networking Model<br> The OSI Seven-Layer Model<br> Comparing OSI to the Four-Layer TCP/IP Model<br> Identifying the OSI Layers at Which Various Network Components Operate<br> Data Encapsulation/Decapsulation and OSI<br> Ports, Protocols, Services, and Traffic Types<br> Connection-Oriented Protocols Versus Connectionless Protocols<br> Internet Protocol<br> Transmission Control Protocol<br> User Datagram Protocol<br> Internet Control Message Protocol<br> IPsec<br> Generic Routing Encapsulation<br> File Transfer Protocol (FTP)<br> Secure File Transfer Protocol (SFTP)<br> Secure Shell (SSH)<br> Telnet<br> Simple Mail Transfer Protocol (SMTP)<br> Domain Name System (DNS)<br> Dynamic Host Configuration Protocol (DHCP)<br> Trivial File Transfer Protocol (TFTP)<br> Hypertext Transfer Protocol (HTTP)<br> Network Time Protocol (NTP)<br> Simple Network Management Protocol (SNMP)<br> Lightweight Directory Access Protocol (LDAP)<br> Hypertext Transfer Protocol Secure (HTTPS)<br> Server Message Block (SMB)<br> Syslog<br> Simple Mail Transfer Protocol Secure (SMTPS)<br> Lightweight Directory Access Protocol over SSL (LDAPS)<br> Structured Query Language (SQL) Server<br> Remote Desktop Protocol (RDP)<br> Session Initiation Protocol (SIP)<br> Understanding Port Functions<br> Traffic Types<br> What’s Next?<br><strong>CHAPTER 2</strong> Network Topologies, Architectures, and Types<br> Network Topologies<br> Star/Hub and Spoke<br> Mesh Topology<br> Hybrid Topology<br> Point to Point<br> Spine and Leaf<br> Three-Tier Hierarchical Model<br> Collapsed Core<br> Traffic Flows<br> Older Topologies: Bus and Ring<br> What’s Next?<br><strong>CHAPTER 3</strong> Network Addressing, Routing, and Switching<br> IPv4 Network Addressing<br> An Overview of IPv4<br> IP Address Classes<br> Subnet Mask Assignment<br> Subnetting<br> Identifying the Differences Between IPv4 Public and Private Networks<br> Classless Interdomain Routing<br> Default Gateways<br> Assigning IP Addresses<br> Identifying MAC Addresses<br> Routing and Switching Technologies<br> The Default Gateway<br> Routing Tables<br> Static Routing<br> Default Route<br> Switching Methods<br> Dynamic Routing<br> Route Selection<br> Address Translation<br> First Hop Redundancy Protocol (FHRP)<br> Virtual IP<br> Subinterfaces<br> Virtual Local-Area Networks<br> Interface Configuration and Switch Management<br> Voice VLAN<br> Trunking<br> The Spanning Tree Protocol (STP)<br> Maximum Transmission Unit (MTU)<br> Network Services<br> Dynamic Host Configuration Protocol<br> The DHCP Process<br> DHCP and DNS Suffixes<br> DHCP Relays and IP Helpers<br> Domain Name Service (DNS)<br> The DNS Namespace<br> Types of DNS Entries<br> DNS Records<br> DNS in a Practical Implementation<br> Time Protocols<br> What’s Next?<br><strong>CHAPTER 4</strong> Network Implementations<br> Common Networking Devices<br> Router<br> Switch<br> Firewall<br> IDS/IPS<br> Load Balancer<br> Proxy Server<br> Network-Attached Storage (NAS)<br> Storage-Area Networks<br> Wireless Access Point<br> Wireless LAN Controller<br> Applications/Content Delivery Network<br> VPNs<br> Quality of Service<br> Time To Live (TTL)<br> Networking Use Cases<br> Software-Defined Networking<br> Virtual Extensible Local-Area Network (VXLAN)<br> Zero Trust Architecture (ZTA)<br> Secure Access Secure Edge (SASE)/Security Service Edge (SSE)<br> Infrastructure as Code (IaC)<br> IPv6 Addressing<br> Comparing IPv4 and IPv6 Addressing<br> What’s Next?<br><strong>CHAPTER 5</strong> Cabling Solutions and Issues<br> General Media Considerations<br> Broadband Versus Baseband Transmissions<br> Simplex, Half-Duplex, and Full-Duplex Modes<br> Data Transmission Rates<br> Wired Versus Wireless<br> Types of Wired Network Media<br> Types of Media Connectors<br> Media Couplers/Converters<br> TIA/EIA 568A and 568B Wiring Standards<br> Straight-Through Versus Crossover Cables<br> Rollover and Loopback Cables<br> Ethernet Copper and Fiber Standards<br> Multiplexing Options<br> Troubleshooting Common Cable Connectivity Issues<br> Limitations, Considerations, and Issues<br> Throughput, Speed, and Distance<br> Cabling Specifications/Limitations<br> Cabling Considerations<br> Cabling Issues<br> Signal Degradation<br> Interference<br> Improper Termination<br> Incorrect Pinout<br> Bad Ports<br> Open/Short<br> LED Status Indicators<br> Duplexing Issues<br> TX/RX Reversed<br> Dirty Optical Cables<br> Interface Issues<br> Hardware Issues<br> Power over Ethernet Issues<br> Transceiver Issues<br> Common Tools<br> Cable Crimpers, Strippers, and Snips/Cutters<br> Punchdown Tools<br> Tone Generator<br> Loopback Adapter<br> TDR/OTDR<br> Multimeter<br> Cable Tester<br> Wire Map<br> Tap<br> Fusion Splicer<br> Spectrum Analyzer<br> Fiber Light Meter<br> What’s Next?<br><strong>CHAPTER 6</strong> Wireless Solutions<br> Understanding Wireless Basics<br> Wireless Channels and Frequencies<br> Speed, Distance, and Bandwidth<br> Channel Bonding<br> MIMO/MU-MIMO/Directional/Omnidirectional<br> Network Types<br> Establishing Communications Between Wireless Devices<br> Guest Networks<br> Configuring the Wireless Connection<br> Autonomous and Lightweight Access Points<br> What’s Next?<br><strong>CHAPTER 7</strong> Cloud Computing Concepts and Options<br> Cloud Concepts<br> Service Models<br> Software as a Service<br> Platform as a Service<br> Infrastructure as a Service<br> Deployment Models<br> Private Cloud<br> Public Cloud<br> Hybrid Cloud<br> Multitenancy<br> Elasticity<br> Scalability<br> Network Functions Virtualization (NFV)<br> Cloud Connectivity Options<br> Virtual Private Cloud (VPC)<br> Cloud Gateways<br> Network Security, Groups, and Lists<br> What’s Next?<br><strong>CHAPTER 8</strong> Network Operations<br> Physical Installation Factors<br> Components of Wiring Distribution<br> Using Uninterruptible Power Supplies<br> Beyond the UPS<br> Environmental Factors<br> Organizational Processes and Procedures<br> Wiring and Port Locations<br> Physical and Logical Network Diagrams<br> Baseline/Golden Configurations<br> Policies, Procedures, Configurations, and Regulations<br> Labeling<br> Monitoring Network Performance<br> Common Performance Metrics<br> SNMP<br> Network Performance, Load, and Stress Testing<br> Network Device Logs<br> Disaster Recovery and High Availability<br> Backups<br> Backup Best Practices<br> Cold, Warm, Hot, and Cloud Sites<br> High-Availability Approaches and Recovery Concepts<br> Active-Active Versus Active-Passive<br> DR Testing<br> Network Access and Management Methods<br> Site-to-Site VPN<br> Client-to-Site VPN<br> Connection Methods<br> Jump Box<br> In-Band Versus Out-of-Band Management<br> What’s Next?<br><strong>CHAPTER 9</strong> Network Security<br> Common Security Concepts<br> Encryption<br> Access Control<br> Mandatory Access Control<br> Discretionary Access Control<br> Rule-Based Access Control<br> Role-Based Access Control<br> Defense in Depth<br> Separation of Duties<br> Deception Technologies: Honeypots and Honeynets<br> RADIUS and TACACS+<br> Kerberos Authentication<br> Local Authentication<br> Lightweight Directory Access Protocol<br> Using Certificates<br> Identity and Access Management (IAM)<br> Security Assertion Markup Language (SAML)<br> Multifactor Authentication Factors<br> Auditing and Regulatory Compliance<br> Additional Access Control Methods<br> Risk Management<br> Penetration Testing<br> Security Information and Event Management<br> Common Networking Attacks<br> Denial-of-Service and Distributed Denial-of-Service Attacks<br> Other Common Attacks<br> Vulnerabilities and Prevention<br> Applying Network Security<br> Disposing of Assets<br> Secured Versus Unsecured Protocols<br> Key Management<br> Hardening Best Practices<br> Wireless Security<br> Working with Zones<br> What’s Next?<br><strong>CHAPTER 10</strong> Network Troubleshooting<br> Troubleshooting Steps and Procedures<br> Identify the Problem<br> Establish a Theory of Probable Cause<br> Test the Theory to Determine the Cause<br> Establish a Plan of Action<br> Implement the Solution or Escalate<br> Verify Full System Functionality<br> Document Findings, Actions, Outcomes, and Lessons Learned Throughout the Process<br> Troubleshooting Common Networking Issues<br> Common Considerations<br> Common Problems to Be Aware Of<br> Hardware Failure<br> Network Performance Issues<br> Wireless Issues<br> Site Surveys<br> Factors Affecting Wireless Signals<br> Troubleshooting AP Coverage<br> Troubleshooting Tools<br> Toner<br> Cable Tester<br> Taps<br> Visual Fault Locator<br> Wi-Fi Analyzer<br> Protocol Analyzer<br> Speed Tester<br> Port Scanner<br> LLDP and CDP<br> NetFlow Analyzer<br> TFTP Server<br> Terminal Emulator<br> IP Scanner<br> Command-Line Tools<br> The Trace Route Utility (tracert/traceroute)<br> ping<br> ARP<br> The netstat Command<br> ipconfig<br> ifconfig<br> nslookup<br> dig<br> The tcpdump Command<br> The route Utility<br> nmap<br> Basic Networking Device Commands<br> What’s Next?<br><strong>Cram Sheet<br><br> Online<br></strong>Glossary<br><br> 9780135340837 TOC 7/25/2024<br></p>